CA2509359A1 - Method and apparatus for advertising a link cost in a data communications network - Google Patents
Method and apparatus for advertising a link cost in a data communications network Download PDFInfo
- Publication number
- CA2509359A1 CA2509359A1 CA002509359A CA2509359A CA2509359A1 CA 2509359 A1 CA2509359 A1 CA 2509359A1 CA 002509359 A CA002509359 A CA 002509359A CA 2509359 A CA2509359 A CA 2509359A CA 2509359 A1 CA2509359 A1 CA 2509359A1
- Authority
- CA
- Canada
- Prior art keywords
- cost
- link
- node
- link cost
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 238000004891 communication Methods 0.000 title claims abstract description 25
- 230000008859 change Effects 0.000 claims abstract description 20
- 230000003247 decreasing effect Effects 0.000 claims description 4
- 238000010586 diagram Methods 0.000 description 11
- 238000013459 approach Methods 0.000 description 7
- 230000003287 optical effect Effects 0.000 description 6
- 238000005457 optimization Methods 0.000 description 6
- 239000000654 additive Substances 0.000 description 5
- 230000000996 additive effect Effects 0.000 description 5
- 238000012360 testing method Methods 0.000 description 5
- 230000009849 deactivation Effects 0.000 description 4
- 230000004913 activation Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 230000008439 repair process Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000007704 transition Effects 0.000 description 2
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 230000001186 cumulative effect Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
- 230000001902 propagating effect Effects 0.000 description 1
- 230000007420 reactivation Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/28—Routing or path finding of packets in data switching networks using route fault recovery
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0241—Advertisements
- G06Q30/0273—Determination of fees for advertising
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
- H04L45/03—Topology update or discovery by updating link state protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/12—Shortest path evaluation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/18—Loop-free operations
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Strategic Management (AREA)
- Finance (AREA)
- Game Theory and Decision Science (AREA)
- Entrepreneurship & Innovation (AREA)
- Economics (AREA)
- Marketing (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
A method is described of advertising a link cost in a data communication network having as components nodes and links. A node detects a change of sta te of an adjacent component. The change of state can be between an activated an d a deactivated state or vice versa. The node varies an associated link cost b y an incremental value and advertises the varied cost.
Description
METHOD AND APPARATUS FOR ADVERTISING A LINK COST IN A
DATA COMMUNICATIONS NETWORK
FIELD OF THE INVENTION
[0001] The present invention generally relates to link costs in a data communications network. The invention relates more specifically to a method and apparatus for advertising a link cost in a data communications network.
BACKGROUND OF THE INVENTION
DATA COMMUNICATIONS NETWORK
FIELD OF THE INVENTION
[0001] The present invention generally relates to link costs in a data communications network. The invention relates more specifically to a method and apparatus for advertising a link cost in a data communications network.
BACKGROUND OF THE INVENTION
[0002] The approaches described in this section could be pursued, but are not necessarily approaches that have been previously conceived or pursued.
Therefore, unless otherwise indicated herein, the approaches described in this section are not prior art to the claims in this application and are not admitted to be prior art by inclusion in this section.
Therefore, unless otherwise indicated herein, the approaches described in this section are not prior art to the claims in this application and are not admitted to be prior art by inclusion in this section.
[0003] h1 computer networks such as the Internet, packets of data are sent from a source to a destination via a networlc of links (communication paths such as telephone or optical lines) and nodes (usually routers directing the packet along one or more of a plurality of liucs connected to it) according to one of various routing protocols.
[0004] One such protocol is the link state protocol. The link state protocol relies on a routing algorithm resident at each node. Each node on the network advertises, throughout the network, linlcs to neighboring nodes and provides a cost associated with each link which can be based on any appropriate metric such as link bandwidth or delay and is typically expressed as an integer value. A link may have an asymmetric cost, that is, the cost in the direction AB along a link may be different from the cost in a direction BA.
Based on the advertised information in the form of a link state packet (LSP) each node constructs a link state database (LSDB) which is a map of the entire network topology and from that constructs generally a single optimum route to each available node based on an appropriate algorithm such as, for example a shortest path first (SPF) algorithm. As a result a "spanning tree" is constructed, rooted at the node and showing an optimum path including intermediate nodes to each available destination node. Because each node has a common LSDB (other than when advertised changes are propagating around the network) any node is able to compute the spanning tree rooted at any other node.
Based on the advertised information in the form of a link state packet (LSP) each node constructs a link state database (LSDB) which is a map of the entire network topology and from that constructs generally a single optimum route to each available node based on an appropriate algorithm such as, for example a shortest path first (SPF) algorithm. As a result a "spanning tree" is constructed, rooted at the node and showing an optimum path including intermediate nodes to each available destination node. Because each node has a common LSDB (other than when advertised changes are propagating around the network) any node is able to compute the spanning tree rooted at any other node.
[0005] As a result when a packet for a destination node arrives at a node (which we term here the "first node"), the first node identifies the optimum route to that destination and forwards the packet to the next node along that route. The next node repeats this step and so forth.
[0006] It will be noted, therefore, that each node decides, irrespective of the node from which it received a packet, the next node to which the packet should be forwarded.
In some instances this can give rise to a "loop". In particular this can occur when the databases (and corresponding forwarding information) are temporarily de-synchronized during a routing transition, that is, where because of a change in the network, a new LSP
is propagated. As an example, if node A sends a packet to node Z via node B, comprising the optimum route according to its SPF, a situation can arise where node B, according to its SPF determines that the best route to node Z is via node A and sends the packet back.
This can continue indefinitely although usually the packet will have a maximum hop count after which it will be discarded. Such a loop can be a direct loop between two nodes or an indirect loop around a circuit of nodes.
In some instances this can give rise to a "loop". In particular this can occur when the databases (and corresponding forwarding information) are temporarily de-synchronized during a routing transition, that is, where because of a change in the network, a new LSP
is propagated. As an example, if node A sends a packet to node Z via node B, comprising the optimum route according to its SPF, a situation can arise where node B, according to its SPF determines that the best route to node Z is via node A and sends the packet back.
This can continue indefinitely although usually the packet will have a maximum hop count after which it will be discarded. Such a loop can be a direct loop between two nodes or an indirect loop around a circuit of nodes.
[0007] In conventional systems, when a link fails this is identified by an adjacent node in a medium specific manner. This instigates a routing transition whereby the neighboring node advertises the link failure to the remainder of the network.
This can be done by simply removing the link from the LSP or, in some circumstances, setting its cost to an integral value high enough to direct all traffic around the failed link.
This value is often termed "infinity" and it will be seen that the approaches are effectively the same.
This can be done by simply removing the link from the LSP or, in some circumstances, setting its cost to an integral value high enough to direct all traffic around the failed link.
This value is often termed "infinity" and it will be seen that the approaches are effectively the same.
[0008] However the LSP advertising the failure takes a finite time to propagate through the network and each node must then re-run its SPF and pass the newly generated routes down to its forwarding mechanism as a result of which there will be inconsistencies between the LSDBs maintained at different nodes on the network. In some circumstances this can give rise to the loops discussed above which may persist until the LSDBs are once more consistent, which can take several hundred milliseconds.
[0010] The underlying causes of looping can be better understood with reference to FIG. 1.
[0011] A simple network is shown designed generally 10 and including nodes A, B, D, X, Y reference numerals 12, 14, 16, 18, 20 respectively. The nodes are joined by links in a circuit running ABDYXA, a link 22 joining nodes A and B. All of the links have a cost 1 except for a link 24 joining nodes Y and D which has a cost 5. When all of the linlcs are operating, a packet arriving at node X and destined for node D will take the route XABD with a cost of 3, as opposed to the route XYD which has a cost of 6.
Similarly, a packet arriving at node Y destined for node D will take route YXABD with a cost of 4 rather than YD with a cost of 5. If the link 22 between nodes A and B fails then node A advertises the failure by sending out an LSP effectively setting the cost for link 22 to "infinity". At some point this LSP will have reached X allowing it to update its LSDB
but will not yet have arrived at node Y. As a result a packet now arriving at node X
destined for node D will be forwarded towards Y as part of the route XYD at a cost 6 as opposed to the route XABD at a cost infinity. However when that packet reaches node Y, as node Y still records the cost of the link 22 between nodes A and B as l, according to its SPF the lowest cost route is still via XABD at a cost 4. Accordingly the packet is returned to node X which again tries to send it to node Y and so forth. It will be seen that a loop of this nature can be a direct loop between two nodes or an indirect loop around a circuit of nodes.
(0012] Loops of this nature are undesirable because they use up bandwidth on the network until the packets are dropped when the hop count reaches the appropriate threshold.
[0013] One proposed solution to advertising link failure is described in Paolo Narvaez, I~ai-Yeung Siu and Hong-Yi Tzeng, "Fault-Tolerant Routing in the Internet without Flooding", proceedings of the 1999 IEEE Workshop on Fault-Tolerant Parallel and Distributed Systems, San Juan, Puerto Rico, April 1999. According to this solution when a link fails, rather than flooding the network with LSPs only those nodes on the shortest or all "restoration paths" around the failed link are notified and each ofthose nodes updates its routing table only in relation to the set of destinations affected by the link failure. As a result packets are forced along a restoration path. However this approach requires significant perturbation of the routing protocols at each node involved, and temporary loops may be formed.
BRIEF DESCRIPTION OF THE DRAWINGS
[0014] The present invention is illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which like reference numerals refer to similar elements and in which:
[0015] FIG. 1 is an illustrative network diagram showing a potential route configuration;
[0016] FIG. 2 shows a generalized networlc diagram corresponding to that of FIG. 1;
[0017] FIG. 3A is a flow diagram illustrating a high-level view of a method of advertising a link cost on a data communication network;
[0018] FIG. 3B is a flow diagram illustrating an alternative embodiment of a method of advertising a linlc cost on a data network; and [0019] FIG. 4 is a block diagram that illustrates a computer system upon which an embodiment may be implemented.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
[0020] A method and apparatus for advertising a link cost on a data communication network is described. In the following description, for the purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to avoid unnecessarily obscuring the present invention.
(0021] Embodiments are described herein according to the following outline:
1.0 General Overview 2.0 Structural and Functional Overview 3.0 Method of Advertising a Link Cost 4.0 finplementation Mechazusms-Hardware Overview 5.0 Extensions and Alternatives 1.0 GENERAL OVERVIEW
[0022] The needs identified in the foregoing Background, and other needs and objects that will become apparent for the following description, are achieved in the present invention, which comprises, in one aspect, a method for advertising a link cost in a data communications network. The network has as components nodes and links. A node detects a change of state of an adjacent component having an associated link between an activated and a deactivated state or vice versa. The associated link cost is varied by an incremental value and the varied cost is advertised.
[0023] Because the link cost is varied incrementally, rather than immediately to its final value, loops are not set up in the remainder of the network.
[0024] In other aspects, the invention encompasses a computer apparatus and a computer-readable medium configured to carry out the foregoing steps.
2.0 STRUCTURAL AND FUNCTIONAL OVERVIEW
[0025] The method can be further understood with reference once again to the embodiments shown in FIG. 1, which depicts an illustrative network diagram showing a potential route configuration. A data communication network comprises nodes A, B, D, X, Y and links 22, 24, 26. Network 10 comprises for example the Internet or a sub-network such as a routing domain or a virtual network. Each link 22, 24, 26 is labeled with an associated link cost, such as "l," "S," etc., which is stored in a routing database at each node in association with information identifying the links. Each node A, B, D, X, Y
comprises one or more hardware or software elements that individually or collectively implement the processes described herein.
[0026] FIG. 3A is a flow diagram illustrating a high-level view of a method of advertising a link cost on a data communication network. In block 302, a change in the state of an adjacent component having an associated link is detected. Changes in state may include failure of a component, deactivation of a component due to planned downtime, activation of a component, etc. In block 304, a link cost value, for a link associated with the component that underwent a change in state, is varied by an incremental value. Varying the link cost value may include incrementing (increasing) the link cost value, decrementing (decreasing) the link cost value, modifying the link cost value by a multiplier or other factor, etc. In block 306, the varied link cost value is advertised to other nodes in the network.
[0027] For example, with reference to FIG. 1, a first node A is communicatively coupled to an adj scent second node B by linlc 22, and a third node X is coupled to node A
by link 28. When node X needs to forward a packet to node A, in normal operation X will forward the packet using link 28, because the cost of link 28 is "1" whereas the cost of following links 26, 24, 23, 22 to node A is "8." When the adjacent component comprising link 22 fails or is deactivated in any other manner such as planned downtime or diverting around a congested link, node A advertises this, incrementally increasing the associated link cost 1 in its routing database, waits for the advertisement to propagate and then increments the associated link cost again. As a result, after the first advertised increment has reached node X then node X will forward the packet to node A as this is still the lowest cost route. The packet is lost but this is preferable to setting up a bandwidth consumed loop as higher level reliable transport protocols will cause node X
to resend the packet to node A.
[0028] Once the first increment has reached all of the nodes, then as nodes X
and Y
"see" the same cost for link 22 the link cost can be incremented again and advertised.
[0029] In the following discussion the optimum size of the increment and the time interval between successively advertised increments will be discussed in more detail. It will also be apparent that the invention can be applied equally to a change of state when a linlc is activated for example when it is brought back into operation by reducing the cost by an appropriate increment from a starting value of infinity in a latter case.
[0030] The method is useful for planned downtime and, as it is designed to operate within the context of existing router protocol it does not disturb those protocols.
Furthermore reconfiguration of remote nodes or routers is not required.
3.0 METHOD OF ADVERTISING A LINK COST
[0031] FIG. 2 shows a generalized network diagram corresponding to that of FIG. 1.
Refernng to FIG. 2 it will be seen that the link costs shown in FIG. 1 are replaced by generalized link costs x, L and y. Link cost x represents the generalized cumulative cost of links between node X and D, link cost L represents the link cost between node X and Y
and link cost y represents the link cost between nodes Y and D. The link 26 between nodes X and Y is, in this example, symmetrical, i.e. the cost of the link is the same in both directions. In other embodiments, link costs may vary according to packet forwarding direction on a link.
[0032] In this system a loop is possible if the following conditions hold true when a link A, B is incremented by i:
cost from X to D via A, B cost from X to D via Y, and cost from Y to D not via X cost from Y to D via XAB.
[0033] This can be represented mathematically:
x+i L+y and y L+x.
[0034] Combining these produces the expression: i 2L.
[0035] Or, for no loops: i < 2L.
[0036] In other words the condition that there can be no loop for any choice of X, Y, D in the network is that any increment is strictly less than twice the minimum link cost in the network (as this is the safest assumption). For a network with a minimum link cost of 1 this gives a maximum safe link cost increment of 1.
[0037] This approach can be extended to a system in which nodes X and Y are not necessarily adjacent and where the link or loop costs between nodes X and Y is asymmetric. In that case, in general, a loop is only possible around a set of two or more nodes if the increment is greater than or equal to the cost of traversing the loop. In those circumstances it can be seen that the above inequality still applies, as no loop cost will be less than twice the minimum linlc cost in the network (as the loop must traverse at least two links).
[0038] In the more general case still there may be multiple failures. In a first case, where rn "additive" increments occur in a common path, then the condition for freedom from loops is:
mi < 2L.
[0039] If the increments are not additive, i.e. they lie in parallel paths), then the condition i < 2L still applies as they cannot influence the same cost at the same time.
[0040] One instance where this can take place is if a node fails as this will cause the simultaneous failure of all links to it. In a case where the node only has two links then the normal condition applies for the minimum increment, i.e., m=1, as the failures are not "additive," i.e., they do not lie in the same path (which is broken by the failed node).
Where there are more than two links to a node then it is possible for additive increments to take place but the maximum value of m is m=2 as no more than two links can lie in a common path through the failed node. As a result in a network having m concurrent link failures and n concurrent node failures (assuming that they must be additive as the worst case scenario, the inequality to avoid loops is (m+2n) i less than 2L.
[0041] It can therefore be guaranteed that if the cost of a failed network component is incremented in steps of i or less and then a fizrther increment is advertised only after a time which guarantees that all nodes have received and processed the updated information, the possibility of loops will not be introduced.
[0042] FIG. 3B is a flow diagram illustrating an alternative embodiment of a method of advertising a link cost on a data network. In block 310, a change is detected in the state of one or more components having associated links. As in FIG. 3A, block 302, changes in state may include failure of a component, deactivation of a component due to planned downtime, activation of a component, etc.
[0043] In block 312, a link cost increment is computed, based on the minimum linlc cost in the network, the number of links for which a state change was detected in block 310, and the number of nodes in the network. In one embodiment, the linlc cost increment is computed such that for a change of state of m links and n nodes an incremental value i meets a condition (m+2n) i < 2 L, where L is a minimum link cost on the network.
[0044] In block 314, the link costs are varied for links associated with components for which a state change was detected in block 302. Varying the link cost value may include incrementing (increasing) the link cost value, decrementing (decreasing) the link cost value, modifying the link cost value by a multiplier or other factor, etc.
Most commonly, when the detected state change for a component indicates deactivation or failure, the associated link cost is decremented by the computed link cost increment value, and when a detected state change indicates re-activation, the link cost is incremented by the link cost increment value.
[0045] In block 316, the link cost value is advertised to other nodes in the network. In bloclc 318, a test is performed to determine whether the varied link cost value has reached either a threshold cost value or a value approximating infinity. Use of the test of block 318 is described further below. If the test of block 318 is true, then there is no further need to increment and advertise link cost values, and processing completes at block 322.
[0046] In block 320, a test is performed to determine whether a specified repeat interval time has elapsed. If so, then control passes to block 314, in which the link costs are varied again by the previously computed increment, and then the new varied link cost value is advertised again in block 316.
[0047] In an optimization an increment can be generated as soon as it can be guaranteed that no node will receive the increment before any of its neighbors have received and processed the previous increment, i.e. after a delay representing the sum of the maximum expected propagation delay between any pair of adjacent nodes and the maximum expected difference in delay between receiving an LSP and the result of the SPF computation based on that LSP being used for forwarding traffic. This delay will be measurable or known based on the specific network components and configuration in use and can, for example, be configured as a management parameter.
[0048] As a further optimization it will be recognized that any increments in a failed link cost will only affect links lying on a common path with the failed link.
Thus, rather than identifying the smallest link cost on the network, only the smallest link cost in the reverse spanning tree rooted at the far end of the failed link, and which traverses the failed linlc, is considered. The "reverse spanning tree", sometimes termed a "sink tree,"
shows the optimum route for each node from which the node is reachable.
Accordingly, as shoran in block 324, optionally a reverse spanning tree is computed before a link cost increment is computed in block 312. Yet a further optimization is to recompute the reverse spanning tree, and hence the maximum permissible next increment, after each increment. Accordingly, control may transfer to block 324 from block 320, as shown in FIG. 3B, rather than directly from block 320 to block 314. This may result in the previous lowest cost link being excluded as a result of which the maximum increment can be increased. Also, for successive recalculation it is likely that the reverse spanning tree will shrink as less and less lowest cost routes include the increasing cost of the failed link.
[0049] Where in conjunction with the above described method, repair paths are being calculated for a failed component according to any appropriate mechanism, in particular a failed node, then in a further optimization incrementing of the cost is synchronized between neighboring nodes to the failed node such that the nodes await incremented LSPs from each other neighbor node for which a repair path is available before issuing a further increment.
[0050] Referring again to the test of block 31 ~, it will be recognized that as a further optimization it is not necessary to continue to increment the link cost to infinity especially as the true value which represents infinity can be very high. In fact it is only necessary to increment the cost until a threshold cost at which the cost of the link is such that no nodes in the network will compute a route using it. In the case of link failure this is guaranteed to have occurred when the cost of the AB link has been incrementally increased to the point where it is greater than the minimum cost path from A to B not passing over the link AB. At that point the cost of a failed link can be increased to "infinity" in one final jump.
In the case of failure of a node B the linlc cost is incremented until it is greater than, for all nodes X, the cost of AX via the shortest alternative path less the cost BX, where the values can be easily computed by running an SPF routed at A.
[0051] In order to minimize the convergence time, the increment cost can be optimized to minimize the number of advertised link cost changes within the increment value limits discussed above.
[0052] Although the above discussion relates to incremental increases in a link cost when a network component fails or is otherwise taken out of service, the approach can be applied equally in the case where a network component is introduced into service. In conventional systems this would effectively be achieved by advertising a link cost change to the new cost in a single jump dome from "infinity" which once again can give rise to loops. In that case, according to the present method, the link cost is first advertised at the upper bound discussed above, i.e. the link cost of the minimum cost path not traversing the new component. This cost is then incrementally decreased, using the same increments and time intervals as for incrementally increasing costs until it reaches the configured value for the link cost. However the node advertising the costs can treat the link throughout as having its final configured cost which can cause data traffic to pass through the link sooner than would otherwise be the case.
[0053) The method described herein can be implemented on a specific node or muter in software or hardware, using the network topology information resident on the router in its LSDB from which SPFs can be run for the specific node or indeed for any other node on the network.
[0054] In the first instance the change of state of a component such as component failure is detected at the node in any appropriate manner which can be, for example, medium specific. Alternatively a planned component activation or deactivation may be taking place - in either case a link cost advertisement as set out above can be implemented. The amount of the increment and the interval between increments can be calculated as discussed above. To the extent that computation is required based, for example, on network topology, this is in the present example done on-the-fly rather than use up computing time prior to the event making use of the network information in the LSDB at the node although this is an alternative. In the case where the link cost is incrementally increased, once the cost reaches infinity, or in an optimization, an upper bound value as discussed above the node can increase the cost to "infinity"
taking the component out of service. Similar considerations apply to bringing a component into service.
5.0 M'LEMENTATION MECHANISMS - HARDWARE OVERVIEW
[0055] FIG. 4 is a block diagram that illustrates a computer system 80 upon which an embodiment of the invention may be implemented. The preferred embodiment is implemented using one or more computer programs running on a network element such as a router device. Thus, in this embodiment, the computer system 80 is a router.
(0056] Computer system 80 includes a bus 82 or other communication mechanism for communicating information, and a processor 84 coupled with bus 82 for processing information. Computer system 80 also includes a main memory 86, such as a random access memory CRAM), flash memory, or other dynamic storage device, coupled to bus 82 for storing information and instructions to be executed by processor 84.
Main memory 86 also may be used for storing temporary variables or other intermediate information during execution of instructions to be executed by processor 84. Computer system 80 further includes a read only memory (ROM) 88 or other static storage device coupled to bus 82 for storing static information and instructions for processor 84. A
storage device 90, such as a magnetic disk, flash memory or optical disk, is provided and coupled to bus 82 for storing information and instructions.
[0057] A communication interface 98 may be coupled to bus 82 for communicating information and command selections to processor 84. Interface 98 is a conventional serial interface such as an RS-232 or RS-422 interface. An external terminal 92 or other computer system connects to the computer system 80 and provides commands to it using the interface 98. Firmware or software running in the computer system 80 provides a to terminal interface or character-based command interface so that external commands can be given to the computer system.
[0058] A switching system 96 is coupled to bus 82 and has an input interface and a respective output interface (commonly designated 99) to external network elements. The external networlc elements may include a plurality of additional routers 120 or a local network coupled to one or more hosts or routers, or a global network such as the Internet having one or more servers. The switching system 96 switches information traffic arriving on the input interface to output interface 99 according to pre-determined protocols and conventions that are well known. For example, switching system 96, in cooperation with processor 84, can determine a destination of a packet of data arriving on the input interface and send it to the correct destination using the output interface. The destinations may include a host, server, other end stations, or other routing and switching devices in a local network or Tnternet.
[0059] The computer system 80 implements as a muter acting as a node the above described method of advertising a link cost where, upon a change of state of a link 99 or a router 120 the associated link cost of link 99 is varied incrementally.
According to one embodiment of the invention, the implementation is provided by computer system 80 in response to processor 84 executing one or more sequences of one or more instructions contained in main memory 86. Such instructions may be read into main memory 86 from another computer-readable medium, such as storage device 90. Execution of the sequences of instructions contained in main memory 86 causes processor 84 to perform the process steps described herein. One or more processors in a multi-processing arrangement may also be employed to execute the sequences of instructions contained in main memory 86. In alternative embodiments, hard-wired circuitry may be used in place of or in combination with software instructions to implement the invention.
Thus, embodiments of the invention are not limited to any specific combination of hardware circuitry and software.
[0060] The term "computer-readable medium" as used herein refers to any medium that participates in providing instructions to processor 84 for execution.
Such a medium may take many forms, including but not limited to, non-volatile media, volatile media, and transmission media. Non-volatile media includes, for example, optical or magnetic disks, such as storage device 90. Volatile media includes dynamic memory, such as main memory 86. Transmission media includes coaxial cables, copper wire and fiber optics, including the wires that comprise bus 82. Transmission media can also take the form of m wireless links such as acoustic or electromagnetic waves, such as those generated during radio wave and infrared data communications.
[0061] Common forms of computer-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, or any other magnetic medium, a CD-ROM, any other optical medium, punch cards, paper tape, any other physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, any other memory chip or cartridge, a carrier wave as described hereinafter, or any other medium from which a computer can read.
[0062] Various forms of computer readable media may be involved in carrying one or more sequences of one or more instructions to processor 84 for execution. For example, the instructions may initially be carried on a magnetic disk of a remote computer. The remote computer can load the instructions into its dynamic memory and send the instructions over a telephone line using a modern. A modem local to computer system 80 can receive the data on the telephone line and use an infrared transmitter to convert the data to an infrared signal. An infrared detector coupled to bus 82 can receive the data carned in the infrared signal and place the data on bus 82. Bus 82 carries the data to main memory 86, from which processor 84 retrieves and executes the instructions.
The instructions received by main memory 86 may optionally be stored on storage device 90 either before or after execution by processor 84.
[0063] Interface 99 also provides a two-way data communication coupling to a network link that is connected to a local network. For example, the interface 99 maybe an integrated services digital network (ISDI~ card or a modem to provide a data communication connection to a corresponding type of telephone line. As another example, the interface 99 may be a local area network (LAIC card to provide a data communication connection to a compatible LAN. Wireless links may also be implemented. In any such implementation, the interface 99 sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.
[0064] The network link typically provides data communication through one or more networlcs to other data devices. For example, the network link may provide a connection through a local networlc to a host computer or to data equipment operated by an Internet Service Provider (ISP). The ISP in turn provides data communication services through the worldwide packet data communication network now commonly referred to as the "Internet". The local network and the Internet both use electrical, electromagnetic or optical signals that carry digital data streams. The signals through the various networks and the signals on the network link and through interface 99, which carry the digital data to and from computer system 80, are exemplary forms of carrier waves transporting the information.
[0065] Computer system 80 can send messages and receive data, including program code, through the network(s), network link and interface 99. In the Internet example, a server might transmit a requested code for an application program through the Internet, ISP, local network and communication interface 98. In accordance with the invention, one such downloaded application provides for the method as described herein.
[0066] The received code may be executed by processor 84~as it is received, and/or stored in storage device 90, or other non-volatile storage for later execution. In this manner, computer system 80 may obtain application code in the form of a carrier wave.
6.0 EXTENSIONS AND ALTERNATIVES
[0067] The method steps set out can be carried out in any appropriate order and aspects from the examples and embodiments described juxtaposed or interchanged as appropriate. It will be appreciated that any appropriate routing protocol can be used such as Intermediate System - Intermediate System (IS-IS) or Open Shortest Path First (OSPF). Similarly any appropriate network can provide the platform for implementation of the method.
[0068] In the foregoing specification, the invention has been described with reference to specific embodiments thereof. It will, however, be evident that various~modifications and changes may be made thereto without departing from the broader spirit and scope of the invention. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense.
[0010] The underlying causes of looping can be better understood with reference to FIG. 1.
[0011] A simple network is shown designed generally 10 and including nodes A, B, D, X, Y reference numerals 12, 14, 16, 18, 20 respectively. The nodes are joined by links in a circuit running ABDYXA, a link 22 joining nodes A and B. All of the links have a cost 1 except for a link 24 joining nodes Y and D which has a cost 5. When all of the linlcs are operating, a packet arriving at node X and destined for node D will take the route XABD with a cost of 3, as opposed to the route XYD which has a cost of 6.
Similarly, a packet arriving at node Y destined for node D will take route YXABD with a cost of 4 rather than YD with a cost of 5. If the link 22 between nodes A and B fails then node A advertises the failure by sending out an LSP effectively setting the cost for link 22 to "infinity". At some point this LSP will have reached X allowing it to update its LSDB
but will not yet have arrived at node Y. As a result a packet now arriving at node X
destined for node D will be forwarded towards Y as part of the route XYD at a cost 6 as opposed to the route XABD at a cost infinity. However when that packet reaches node Y, as node Y still records the cost of the link 22 between nodes A and B as l, according to its SPF the lowest cost route is still via XABD at a cost 4. Accordingly the packet is returned to node X which again tries to send it to node Y and so forth. It will be seen that a loop of this nature can be a direct loop between two nodes or an indirect loop around a circuit of nodes.
(0012] Loops of this nature are undesirable because they use up bandwidth on the network until the packets are dropped when the hop count reaches the appropriate threshold.
[0013] One proposed solution to advertising link failure is described in Paolo Narvaez, I~ai-Yeung Siu and Hong-Yi Tzeng, "Fault-Tolerant Routing in the Internet without Flooding", proceedings of the 1999 IEEE Workshop on Fault-Tolerant Parallel and Distributed Systems, San Juan, Puerto Rico, April 1999. According to this solution when a link fails, rather than flooding the network with LSPs only those nodes on the shortest or all "restoration paths" around the failed link are notified and each ofthose nodes updates its routing table only in relation to the set of destinations affected by the link failure. As a result packets are forced along a restoration path. However this approach requires significant perturbation of the routing protocols at each node involved, and temporary loops may be formed.
BRIEF DESCRIPTION OF THE DRAWINGS
[0014] The present invention is illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which like reference numerals refer to similar elements and in which:
[0015] FIG. 1 is an illustrative network diagram showing a potential route configuration;
[0016] FIG. 2 shows a generalized networlc diagram corresponding to that of FIG. 1;
[0017] FIG. 3A is a flow diagram illustrating a high-level view of a method of advertising a link cost on a data communication network;
[0018] FIG. 3B is a flow diagram illustrating an alternative embodiment of a method of advertising a linlc cost on a data network; and [0019] FIG. 4 is a block diagram that illustrates a computer system upon which an embodiment may be implemented.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
[0020] A method and apparatus for advertising a link cost on a data communication network is described. In the following description, for the purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to avoid unnecessarily obscuring the present invention.
(0021] Embodiments are described herein according to the following outline:
1.0 General Overview 2.0 Structural and Functional Overview 3.0 Method of Advertising a Link Cost 4.0 finplementation Mechazusms-Hardware Overview 5.0 Extensions and Alternatives 1.0 GENERAL OVERVIEW
[0022] The needs identified in the foregoing Background, and other needs and objects that will become apparent for the following description, are achieved in the present invention, which comprises, in one aspect, a method for advertising a link cost in a data communications network. The network has as components nodes and links. A node detects a change of state of an adjacent component having an associated link between an activated and a deactivated state or vice versa. The associated link cost is varied by an incremental value and the varied cost is advertised.
[0023] Because the link cost is varied incrementally, rather than immediately to its final value, loops are not set up in the remainder of the network.
[0024] In other aspects, the invention encompasses a computer apparatus and a computer-readable medium configured to carry out the foregoing steps.
2.0 STRUCTURAL AND FUNCTIONAL OVERVIEW
[0025] The method can be further understood with reference once again to the embodiments shown in FIG. 1, which depicts an illustrative network diagram showing a potential route configuration. A data communication network comprises nodes A, B, D, X, Y and links 22, 24, 26. Network 10 comprises for example the Internet or a sub-network such as a routing domain or a virtual network. Each link 22, 24, 26 is labeled with an associated link cost, such as "l," "S," etc., which is stored in a routing database at each node in association with information identifying the links. Each node A, B, D, X, Y
comprises one or more hardware or software elements that individually or collectively implement the processes described herein.
[0026] FIG. 3A is a flow diagram illustrating a high-level view of a method of advertising a link cost on a data communication network. In block 302, a change in the state of an adjacent component having an associated link is detected. Changes in state may include failure of a component, deactivation of a component due to planned downtime, activation of a component, etc. In block 304, a link cost value, for a link associated with the component that underwent a change in state, is varied by an incremental value. Varying the link cost value may include incrementing (increasing) the link cost value, decrementing (decreasing) the link cost value, modifying the link cost value by a multiplier or other factor, etc. In block 306, the varied link cost value is advertised to other nodes in the network.
[0027] For example, with reference to FIG. 1, a first node A is communicatively coupled to an adj scent second node B by linlc 22, and a third node X is coupled to node A
by link 28. When node X needs to forward a packet to node A, in normal operation X will forward the packet using link 28, because the cost of link 28 is "1" whereas the cost of following links 26, 24, 23, 22 to node A is "8." When the adjacent component comprising link 22 fails or is deactivated in any other manner such as planned downtime or diverting around a congested link, node A advertises this, incrementally increasing the associated link cost 1 in its routing database, waits for the advertisement to propagate and then increments the associated link cost again. As a result, after the first advertised increment has reached node X then node X will forward the packet to node A as this is still the lowest cost route. The packet is lost but this is preferable to setting up a bandwidth consumed loop as higher level reliable transport protocols will cause node X
to resend the packet to node A.
[0028] Once the first increment has reached all of the nodes, then as nodes X
and Y
"see" the same cost for link 22 the link cost can be incremented again and advertised.
[0029] In the following discussion the optimum size of the increment and the time interval between successively advertised increments will be discussed in more detail. It will also be apparent that the invention can be applied equally to a change of state when a linlc is activated for example when it is brought back into operation by reducing the cost by an appropriate increment from a starting value of infinity in a latter case.
[0030] The method is useful for planned downtime and, as it is designed to operate within the context of existing router protocol it does not disturb those protocols.
Furthermore reconfiguration of remote nodes or routers is not required.
3.0 METHOD OF ADVERTISING A LINK COST
[0031] FIG. 2 shows a generalized network diagram corresponding to that of FIG. 1.
Refernng to FIG. 2 it will be seen that the link costs shown in FIG. 1 are replaced by generalized link costs x, L and y. Link cost x represents the generalized cumulative cost of links between node X and D, link cost L represents the link cost between node X and Y
and link cost y represents the link cost between nodes Y and D. The link 26 between nodes X and Y is, in this example, symmetrical, i.e. the cost of the link is the same in both directions. In other embodiments, link costs may vary according to packet forwarding direction on a link.
[0032] In this system a loop is possible if the following conditions hold true when a link A, B is incremented by i:
cost from X to D via A, B cost from X to D via Y, and cost from Y to D not via X cost from Y to D via XAB.
[0033] This can be represented mathematically:
x+i L+y and y L+x.
[0034] Combining these produces the expression: i 2L.
[0035] Or, for no loops: i < 2L.
[0036] In other words the condition that there can be no loop for any choice of X, Y, D in the network is that any increment is strictly less than twice the minimum link cost in the network (as this is the safest assumption). For a network with a minimum link cost of 1 this gives a maximum safe link cost increment of 1.
[0037] This approach can be extended to a system in which nodes X and Y are not necessarily adjacent and where the link or loop costs between nodes X and Y is asymmetric. In that case, in general, a loop is only possible around a set of two or more nodes if the increment is greater than or equal to the cost of traversing the loop. In those circumstances it can be seen that the above inequality still applies, as no loop cost will be less than twice the minimum linlc cost in the network (as the loop must traverse at least two links).
[0038] In the more general case still there may be multiple failures. In a first case, where rn "additive" increments occur in a common path, then the condition for freedom from loops is:
mi < 2L.
[0039] If the increments are not additive, i.e. they lie in parallel paths), then the condition i < 2L still applies as they cannot influence the same cost at the same time.
[0040] One instance where this can take place is if a node fails as this will cause the simultaneous failure of all links to it. In a case where the node only has two links then the normal condition applies for the minimum increment, i.e., m=1, as the failures are not "additive," i.e., they do not lie in the same path (which is broken by the failed node).
Where there are more than two links to a node then it is possible for additive increments to take place but the maximum value of m is m=2 as no more than two links can lie in a common path through the failed node. As a result in a network having m concurrent link failures and n concurrent node failures (assuming that they must be additive as the worst case scenario, the inequality to avoid loops is (m+2n) i less than 2L.
[0041] It can therefore be guaranteed that if the cost of a failed network component is incremented in steps of i or less and then a fizrther increment is advertised only after a time which guarantees that all nodes have received and processed the updated information, the possibility of loops will not be introduced.
[0042] FIG. 3B is a flow diagram illustrating an alternative embodiment of a method of advertising a link cost on a data network. In block 310, a change is detected in the state of one or more components having associated links. As in FIG. 3A, block 302, changes in state may include failure of a component, deactivation of a component due to planned downtime, activation of a component, etc.
[0043] In block 312, a link cost increment is computed, based on the minimum linlc cost in the network, the number of links for which a state change was detected in block 310, and the number of nodes in the network. In one embodiment, the linlc cost increment is computed such that for a change of state of m links and n nodes an incremental value i meets a condition (m+2n) i < 2 L, where L is a minimum link cost on the network.
[0044] In block 314, the link costs are varied for links associated with components for which a state change was detected in block 302. Varying the link cost value may include incrementing (increasing) the link cost value, decrementing (decreasing) the link cost value, modifying the link cost value by a multiplier or other factor, etc.
Most commonly, when the detected state change for a component indicates deactivation or failure, the associated link cost is decremented by the computed link cost increment value, and when a detected state change indicates re-activation, the link cost is incremented by the link cost increment value.
[0045] In block 316, the link cost value is advertised to other nodes in the network. In bloclc 318, a test is performed to determine whether the varied link cost value has reached either a threshold cost value or a value approximating infinity. Use of the test of block 318 is described further below. If the test of block 318 is true, then there is no further need to increment and advertise link cost values, and processing completes at block 322.
[0046] In block 320, a test is performed to determine whether a specified repeat interval time has elapsed. If so, then control passes to block 314, in which the link costs are varied again by the previously computed increment, and then the new varied link cost value is advertised again in block 316.
[0047] In an optimization an increment can be generated as soon as it can be guaranteed that no node will receive the increment before any of its neighbors have received and processed the previous increment, i.e. after a delay representing the sum of the maximum expected propagation delay between any pair of adjacent nodes and the maximum expected difference in delay between receiving an LSP and the result of the SPF computation based on that LSP being used for forwarding traffic. This delay will be measurable or known based on the specific network components and configuration in use and can, for example, be configured as a management parameter.
[0048] As a further optimization it will be recognized that any increments in a failed link cost will only affect links lying on a common path with the failed link.
Thus, rather than identifying the smallest link cost on the network, only the smallest link cost in the reverse spanning tree rooted at the far end of the failed link, and which traverses the failed linlc, is considered. The "reverse spanning tree", sometimes termed a "sink tree,"
shows the optimum route for each node from which the node is reachable.
Accordingly, as shoran in block 324, optionally a reverse spanning tree is computed before a link cost increment is computed in block 312. Yet a further optimization is to recompute the reverse spanning tree, and hence the maximum permissible next increment, after each increment. Accordingly, control may transfer to block 324 from block 320, as shown in FIG. 3B, rather than directly from block 320 to block 314. This may result in the previous lowest cost link being excluded as a result of which the maximum increment can be increased. Also, for successive recalculation it is likely that the reverse spanning tree will shrink as less and less lowest cost routes include the increasing cost of the failed link.
[0049] Where in conjunction with the above described method, repair paths are being calculated for a failed component according to any appropriate mechanism, in particular a failed node, then in a further optimization incrementing of the cost is synchronized between neighboring nodes to the failed node such that the nodes await incremented LSPs from each other neighbor node for which a repair path is available before issuing a further increment.
[0050] Referring again to the test of block 31 ~, it will be recognized that as a further optimization it is not necessary to continue to increment the link cost to infinity especially as the true value which represents infinity can be very high. In fact it is only necessary to increment the cost until a threshold cost at which the cost of the link is such that no nodes in the network will compute a route using it. In the case of link failure this is guaranteed to have occurred when the cost of the AB link has been incrementally increased to the point where it is greater than the minimum cost path from A to B not passing over the link AB. At that point the cost of a failed link can be increased to "infinity" in one final jump.
In the case of failure of a node B the linlc cost is incremented until it is greater than, for all nodes X, the cost of AX via the shortest alternative path less the cost BX, where the values can be easily computed by running an SPF routed at A.
[0051] In order to minimize the convergence time, the increment cost can be optimized to minimize the number of advertised link cost changes within the increment value limits discussed above.
[0052] Although the above discussion relates to incremental increases in a link cost when a network component fails or is otherwise taken out of service, the approach can be applied equally in the case where a network component is introduced into service. In conventional systems this would effectively be achieved by advertising a link cost change to the new cost in a single jump dome from "infinity" which once again can give rise to loops. In that case, according to the present method, the link cost is first advertised at the upper bound discussed above, i.e. the link cost of the minimum cost path not traversing the new component. This cost is then incrementally decreased, using the same increments and time intervals as for incrementally increasing costs until it reaches the configured value for the link cost. However the node advertising the costs can treat the link throughout as having its final configured cost which can cause data traffic to pass through the link sooner than would otherwise be the case.
[0053) The method described herein can be implemented on a specific node or muter in software or hardware, using the network topology information resident on the router in its LSDB from which SPFs can be run for the specific node or indeed for any other node on the network.
[0054] In the first instance the change of state of a component such as component failure is detected at the node in any appropriate manner which can be, for example, medium specific. Alternatively a planned component activation or deactivation may be taking place - in either case a link cost advertisement as set out above can be implemented. The amount of the increment and the interval between increments can be calculated as discussed above. To the extent that computation is required based, for example, on network topology, this is in the present example done on-the-fly rather than use up computing time prior to the event making use of the network information in the LSDB at the node although this is an alternative. In the case where the link cost is incrementally increased, once the cost reaches infinity, or in an optimization, an upper bound value as discussed above the node can increase the cost to "infinity"
taking the component out of service. Similar considerations apply to bringing a component into service.
5.0 M'LEMENTATION MECHANISMS - HARDWARE OVERVIEW
[0055] FIG. 4 is a block diagram that illustrates a computer system 80 upon which an embodiment of the invention may be implemented. The preferred embodiment is implemented using one or more computer programs running on a network element such as a router device. Thus, in this embodiment, the computer system 80 is a router.
(0056] Computer system 80 includes a bus 82 or other communication mechanism for communicating information, and a processor 84 coupled with bus 82 for processing information. Computer system 80 also includes a main memory 86, such as a random access memory CRAM), flash memory, or other dynamic storage device, coupled to bus 82 for storing information and instructions to be executed by processor 84.
Main memory 86 also may be used for storing temporary variables or other intermediate information during execution of instructions to be executed by processor 84. Computer system 80 further includes a read only memory (ROM) 88 or other static storage device coupled to bus 82 for storing static information and instructions for processor 84. A
storage device 90, such as a magnetic disk, flash memory or optical disk, is provided and coupled to bus 82 for storing information and instructions.
[0057] A communication interface 98 may be coupled to bus 82 for communicating information and command selections to processor 84. Interface 98 is a conventional serial interface such as an RS-232 or RS-422 interface. An external terminal 92 or other computer system connects to the computer system 80 and provides commands to it using the interface 98. Firmware or software running in the computer system 80 provides a to terminal interface or character-based command interface so that external commands can be given to the computer system.
[0058] A switching system 96 is coupled to bus 82 and has an input interface and a respective output interface (commonly designated 99) to external network elements. The external networlc elements may include a plurality of additional routers 120 or a local network coupled to one or more hosts or routers, or a global network such as the Internet having one or more servers. The switching system 96 switches information traffic arriving on the input interface to output interface 99 according to pre-determined protocols and conventions that are well known. For example, switching system 96, in cooperation with processor 84, can determine a destination of a packet of data arriving on the input interface and send it to the correct destination using the output interface. The destinations may include a host, server, other end stations, or other routing and switching devices in a local network or Tnternet.
[0059] The computer system 80 implements as a muter acting as a node the above described method of advertising a link cost where, upon a change of state of a link 99 or a router 120 the associated link cost of link 99 is varied incrementally.
According to one embodiment of the invention, the implementation is provided by computer system 80 in response to processor 84 executing one or more sequences of one or more instructions contained in main memory 86. Such instructions may be read into main memory 86 from another computer-readable medium, such as storage device 90. Execution of the sequences of instructions contained in main memory 86 causes processor 84 to perform the process steps described herein. One or more processors in a multi-processing arrangement may also be employed to execute the sequences of instructions contained in main memory 86. In alternative embodiments, hard-wired circuitry may be used in place of or in combination with software instructions to implement the invention.
Thus, embodiments of the invention are not limited to any specific combination of hardware circuitry and software.
[0060] The term "computer-readable medium" as used herein refers to any medium that participates in providing instructions to processor 84 for execution.
Such a medium may take many forms, including but not limited to, non-volatile media, volatile media, and transmission media. Non-volatile media includes, for example, optical or magnetic disks, such as storage device 90. Volatile media includes dynamic memory, such as main memory 86. Transmission media includes coaxial cables, copper wire and fiber optics, including the wires that comprise bus 82. Transmission media can also take the form of m wireless links such as acoustic or electromagnetic waves, such as those generated during radio wave and infrared data communications.
[0061] Common forms of computer-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, or any other magnetic medium, a CD-ROM, any other optical medium, punch cards, paper tape, any other physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, any other memory chip or cartridge, a carrier wave as described hereinafter, or any other medium from which a computer can read.
[0062] Various forms of computer readable media may be involved in carrying one or more sequences of one or more instructions to processor 84 for execution. For example, the instructions may initially be carried on a magnetic disk of a remote computer. The remote computer can load the instructions into its dynamic memory and send the instructions over a telephone line using a modern. A modem local to computer system 80 can receive the data on the telephone line and use an infrared transmitter to convert the data to an infrared signal. An infrared detector coupled to bus 82 can receive the data carned in the infrared signal and place the data on bus 82. Bus 82 carries the data to main memory 86, from which processor 84 retrieves and executes the instructions.
The instructions received by main memory 86 may optionally be stored on storage device 90 either before or after execution by processor 84.
[0063] Interface 99 also provides a two-way data communication coupling to a network link that is connected to a local network. For example, the interface 99 maybe an integrated services digital network (ISDI~ card or a modem to provide a data communication connection to a corresponding type of telephone line. As another example, the interface 99 may be a local area network (LAIC card to provide a data communication connection to a compatible LAN. Wireless links may also be implemented. In any such implementation, the interface 99 sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.
[0064] The network link typically provides data communication through one or more networlcs to other data devices. For example, the network link may provide a connection through a local networlc to a host computer or to data equipment operated by an Internet Service Provider (ISP). The ISP in turn provides data communication services through the worldwide packet data communication network now commonly referred to as the "Internet". The local network and the Internet both use electrical, electromagnetic or optical signals that carry digital data streams. The signals through the various networks and the signals on the network link and through interface 99, which carry the digital data to and from computer system 80, are exemplary forms of carrier waves transporting the information.
[0065] Computer system 80 can send messages and receive data, including program code, through the network(s), network link and interface 99. In the Internet example, a server might transmit a requested code for an application program through the Internet, ISP, local network and communication interface 98. In accordance with the invention, one such downloaded application provides for the method as described herein.
[0066] The received code may be executed by processor 84~as it is received, and/or stored in storage device 90, or other non-volatile storage for later execution. In this manner, computer system 80 may obtain application code in the form of a carrier wave.
6.0 EXTENSIONS AND ALTERNATIVES
[0067] The method steps set out can be carried out in any appropriate order and aspects from the examples and embodiments described juxtaposed or interchanged as appropriate. It will be appreciated that any appropriate routing protocol can be used such as Intermediate System - Intermediate System (IS-IS) or Open Shortest Path First (OSPF). Similarly any appropriate network can provide the platform for implementation of the method.
[0068] In the foregoing specification, the invention has been described with reference to specific embodiments thereof. It will, however, be evident that various~modifications and changes may be made thereto without departing from the broader spirit and scope of the invention. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense.
Claims (15)
1. A method of advertising a link cost in a data communication network having as components nodes and links in which a node carries out the steps of:
detecting a change of state of an adjacent component having an associated link between activated and deactivated or vice versa;
varying an associated link cost by an incremental value that is slightly different from the then-current link cost value, and without immediately changing the link cost to infinity or zero; and advertising the varied cost.
detecting a change of state of an adjacent component having an associated link between activated and deactivated or vice versa;
varying an associated link cost by an incremental value that is slightly different from the then-current link cost value, and without immediately changing the link cost to infinity or zero; and advertising the varied cost.
2. A method as claimed in Claim 1, in which the node repeats the steps of varying the associated link cost by an incremental value and advertising the varied cost, at one or more predetermined intervals.
3. A method as claimed in Claim 2, in which the one or more predetermined intervals comprise an interval after which nodes on the network have received and processed the advertised varied cost.
4. A method as claimed in Claim 2, in which the one or more predetermined intervals comprise an interval after which any pair of adjacent nodes have received and processed the advertised varied cost.
5. The method as claimed in Claim 2, in which the steps are repeated until a threshold cost is reached at which no node on the network will compute a route using the associated link.
6. The method as claimed in Claim 1, in which the change of state is from activated to deactivated, and wherein the step of varying the associated link cost comprises incrementally increasing the associated link cost.
7. The method as claimed in Claim 1, in which the change of state is from deactivated to activated, and wherein the step of varying the associated link cost comprises incrementally decreasing the associated link cost.
8. A method as claimed in claim 1, in which the incremental value is selected to be less than twice a minimum link cost of a predetermined set of links on the network.
9. A method as claimed in claim 8, in which the node has an adjacent node reachable along the associated link and the predetermined set of links comprises all links over which the adjacent node is reachable via the associated link.
10. A method as claimed in claim 9 further comprising the step of constructing a reverse spanning tree rooted at the adjacent node including paths containing the associated link, and wherein the predetermined set of links comprise all links included in the reverse spanning tree.
11. A method as claimed in Claim 1, in which for a change of state of m links and n nodes an incremental value i meets a condition (m+2n) i < 2 L, where L is a minimum link cost on the network.
12. A computer-readable medium comprising one or more sequences of instructions for advertising a link cost in a data communication network having as components nodes and links, which instructions, when executed by one or more processors, causes the one or more processors to perform the steps of any of Claims 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, or 11.
13. An apparatus for advertising a link cost in a data communication network having as components nodes and links, comprising means for performing the steps of any of Claims 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, or 11.
14. An apparatus for advertising a link cost in a data communication network having as components nodes and links, comprising:
a processor;
a network interface communicatively coupled to the processor to communicate one or more packet flows among the processor and a network via adjacent components to the processor; and a computer-readable medium accessible to the processor and comprising one or more sequences of instructions for advertising a link cost in a data communication network having as components nodes and links, which instructions, when executed by the processor, cause the processor to perform the steps of any of Claims 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, or 11.
a processor;
a network interface communicatively coupled to the processor to communicate one or more packet flows among the processor and a network via adjacent components to the processor; and a computer-readable medium accessible to the processor and comprising one or more sequences of instructions for advertising a link cost in a data communication network having as components nodes and links, which instructions, when executed by the processor, cause the processor to perform the steps of any of Claims 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, or 11.
15. An apparatus as claimed in claim 14 comprising a router.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/323,358 US7792991B2 (en) | 2002-12-17 | 2002-12-17 | Method and apparatus for advertising a link cost in a data communications network |
US10/323,358 | 2002-12-17 | ||
PCT/US2003/034672 WO2004062208A1 (en) | 2002-12-17 | 2003-10-30 | Method and apparatus for advertising a link cost in a data communications network |
Publications (1)
Publication Number | Publication Date |
---|---|
CA2509359A1 true CA2509359A1 (en) | 2004-07-22 |
Family
ID=32507313
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002509359A Abandoned CA2509359A1 (en) | 2002-12-17 | 2003-10-30 | Method and apparatus for advertising a link cost in a data communications network |
Country Status (6)
Country | Link |
---|---|
US (1) | US7792991B2 (en) |
EP (1) | EP1573987B1 (en) |
CN (1) | CN100444575C (en) |
AU (1) | AU2003303532B2 (en) |
CA (1) | CA2509359A1 (en) |
WO (1) | WO2004062208A1 (en) |
Families Citing this family (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7707307B2 (en) * | 2003-01-09 | 2010-04-27 | Cisco Technology, Inc. | Method and apparatus for constructing a backup route in a data communications network |
US7308506B1 (en) | 2003-01-14 | 2007-12-11 | Cisco Technology, Inc. | Method and apparatus for processing data traffic across a data communication network |
US7869350B1 (en) | 2003-01-15 | 2011-01-11 | Cisco Technology, Inc. | Method and apparatus for determining a data communication network repair strategy |
US7330440B1 (en) | 2003-05-20 | 2008-02-12 | Cisco Technology, Inc. | Method and apparatus for constructing a transition route in a data communications network |
US7715403B2 (en) * | 2003-10-01 | 2010-05-11 | Genband Inc. | Methods, systems, and computer program products for load balanced and symmetric path computations for VoIP traffic engineering |
US7580360B2 (en) * | 2003-10-14 | 2009-08-25 | Cisco Technology, Inc. | Method and apparatus for generating routing information in a data communications network |
US7554921B2 (en) * | 2003-10-14 | 2009-06-30 | Cisco Technology, Inc. | Method and apparatus for generating routing information in a data communication network |
US7042838B1 (en) | 2004-05-18 | 2006-05-09 | Cisco Technology, Inc. | Method and apparatus for forwarding data in a data communications network |
US7848240B2 (en) * | 2004-06-01 | 2010-12-07 | Cisco Technology, Inc. | Method and apparatus for forwarding data in a data communications network |
US7649834B2 (en) * | 2004-09-15 | 2010-01-19 | At&T Intellectual Property Ii, L.P. | Method and apparatus for determining neighboring routing elements and rerouting traffic in a computer network |
US7630298B2 (en) * | 2004-10-27 | 2009-12-08 | Cisco Technology, Inc. | Method and apparatus for forwarding data in a data communications network |
US7933197B2 (en) * | 2005-02-22 | 2011-04-26 | Cisco Technology, Inc. | Method and apparatus for constructing a repair path around a non-available component in a data communications network |
US8077718B2 (en) * | 2005-08-12 | 2011-12-13 | Microsoft Corporation | Distributed network management |
US7966419B2 (en) * | 2006-07-03 | 2011-06-21 | Palo Alto Research Center Incorporated | Congestion management in an ad-hoc network based upon a predicted information utility |
US7986640B2 (en) * | 2006-07-05 | 2011-07-26 | Cisco Technology, Inc. | Technique for efficiently determining acceptable link-based loop free alternates in a computer network |
US7940776B2 (en) * | 2007-06-13 | 2011-05-10 | Cisco Technology, Inc. | Fast re-routing in distance vector routing protocol networks |
US8233905B2 (en) | 2007-06-15 | 2012-07-31 | Silver Spring Networks, Inc. | Load management in wireless mesh communications networks |
EP2043306B1 (en) * | 2007-09-28 | 2015-04-15 | Unify GmbH & Co. KG | Method for organising network nodes in a packet-oriented network |
US8203938B2 (en) * | 2008-05-22 | 2012-06-19 | Level 3 Communications, Llc | Multi-router IGP fate sharing |
CN101651600B (en) * | 2008-08-14 | 2011-11-16 | 中国移动通信集团设计院有限公司 | Method and device for updating link cost in grid network |
US8955107B2 (en) | 2008-09-12 | 2015-02-10 | Juniper Networks, Inc. | Hierarchical application of security services within a computer network |
US8040808B1 (en) * | 2008-10-20 | 2011-10-18 | Juniper Networks, Inc. | Service aware path selection with a network acceleration device |
US8094575B1 (en) | 2009-03-24 | 2012-01-10 | Juniper Networks, Inc. | Routing protocol extension for network acceleration service-aware path selection within computer networks |
US8542578B1 (en) | 2010-08-04 | 2013-09-24 | Cisco Technology, Inc. | System and method for providing a link-state path to a node in a network environment |
CN102487352B (en) * | 2010-12-02 | 2014-09-10 | 中兴通讯股份有限公司 | Service distributing method and device |
US20130138764A1 (en) * | 2011-11-30 | 2013-05-30 | Soumendu S. Satapathy | Method and system for virtual machine data migration |
CN103023783B (en) * | 2012-12-03 | 2016-06-29 | 杭州华三通信技术有限公司 | A kind of data transmission method and equipment based on DVPN |
US9628371B2 (en) | 2013-04-23 | 2017-04-18 | Cisco Technology, Inc. | Controlling routing during scheduled node downtime |
CN105490970B (en) * | 2015-12-08 | 2018-10-30 | 迈普通信技术股份有限公司 | A kind of method, apparatus and system of link Fast Convergent |
US10164836B2 (en) | 2015-12-22 | 2018-12-25 | Amazon Technologies, Inc. | Shifting network traffic from a network device |
US10129089B1 (en) * | 2015-12-22 | 2018-11-13 | Amazon Technologies, Inc. | Shifting network traffic |
US20180123867A1 (en) * | 2016-10-31 | 2018-05-03 | Microsoft Technology Licensing, Llc | Automatic network connection recovery in the presence of multiple network interfaces |
CN108418716B (en) * | 2018-03-02 | 2022-01-11 | 广东工业大学 | Network connection recovery method, device and system and readable storage medium |
US11528224B1 (en) * | 2021-10-15 | 2022-12-13 | Hewlett Packard Enterprise Development Lp | Dynamic traffic redirection for a virtual gateway of a distributed tunnel fabric |
Family Cites Families (64)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5253248A (en) * | 1990-07-03 | 1993-10-12 | At&T Bell Laboratories | Congestion control for connectionless traffic in data networks via alternate routing |
US5251205A (en) * | 1990-09-04 | 1993-10-05 | Digital Equipment Corporation | Multiple protocol routing |
US5243592A (en) * | 1990-10-15 | 1993-09-07 | Digital Equipment Corporation | Method and apparatus for distance vector routing on datagram point-to-point links |
US5265092A (en) * | 1992-03-18 | 1993-11-23 | Digital Equipment Corporation | Synchronization mechanism for link state packet routing |
US6151324A (en) * | 1996-06-03 | 2000-11-21 | Cabletron Systems, Inc. | Aggregation of mac data flows through pre-established path between ingress and egress switch to reduce number of number connections |
US6018576A (en) * | 1996-12-31 | 2000-01-25 | Mci Communications Corporation | Method and apparatus for automated node-based normalization after network restoration |
US5999286A (en) * | 1997-01-09 | 1999-12-07 | Alcatel | Method and system for restoring a distributed telecommunications network |
US6032194A (en) * | 1997-12-24 | 2000-02-29 | Cisco Technology, Inc. | Method and apparatus for rapidly reconfiguring computer networks |
US6697333B1 (en) * | 1998-03-04 | 2004-02-24 | Alcatel Canada Inc. | Bandwidth load consideration in network route selection |
US6690671B1 (en) * | 1998-08-17 | 2004-02-10 | Marconi Communications, Inc. | Load balanced UBR routing in ATM networks |
US6507577B1 (en) * | 1998-11-12 | 2003-01-14 | Nortel Networks Limited | Voice over internet protocol network architecture |
US6321271B1 (en) * | 1998-12-22 | 2001-11-20 | Lucent Technologies Inc. | Constrained shortest path routing method |
US6990068B1 (en) * | 1999-01-15 | 2006-01-24 | Cisco Technology, Inc. | Virtual path restoration scheme using fast dynamic mesh restoration in an optical network |
US6724722B1 (en) * | 1999-03-19 | 2004-04-20 | Lucent Technologies Inc. | Managing congestion and potential traffic growth in an information network |
US6473421B1 (en) * | 1999-03-29 | 2002-10-29 | Cisco Technology, Inc. | Hierarchical label switching across multiple OSPF areas |
US7344607B2 (en) * | 1999-07-08 | 2008-03-18 | Ge Betz, Inc. | Non-chromate conversion coating treatment for metals |
US6535481B1 (en) * | 1999-08-20 | 2003-03-18 | Nortel Networks Limited | Network data routing protection cycles for automatic protection switching |
US6363319B1 (en) * | 1999-08-31 | 2002-03-26 | Nortel Networks Limited | Constraint-based route selection using biased cost |
US6744775B1 (en) * | 1999-09-27 | 2004-06-01 | Nortel Networks Limited | State information and routing table updates in large scale data networks |
US6578086B1 (en) * | 1999-09-27 | 2003-06-10 | Nortel Networks Limited | Dynamically managing the topology of a data network |
US6349091B1 (en) * | 1999-11-12 | 2002-02-19 | Itt Manufacturing Enterprises, Inc. | Method and apparatus for controlling communication links between network nodes to reduce communication protocol overhead traffic |
US6697325B1 (en) * | 1999-12-07 | 2004-02-24 | Nortel Networks Limited | System, device, and method for expediting reconvergence in a communication network |
US6845091B2 (en) * | 2000-03-16 | 2005-01-18 | Sri International | Mobile ad hoc extensions for the internet |
AU2001269827A1 (en) * | 2000-06-16 | 2002-01-02 | The Regents Of The University Of California | Bandwidth efficient source tracing (best) routing protocol for wireless networks |
US20020093954A1 (en) * | 2000-07-05 | 2002-07-18 | Jon Weil | Failure protection in a communications network |
WO2002006918A2 (en) | 2000-07-14 | 2002-01-24 | Telcordia Technologies, Inc. | A method, system, and product for preventing data loss and forwarding loops when conducting a scheduled change to the topology of a link-state routing protocol network |
US6668282B1 (en) * | 2000-08-02 | 2003-12-23 | International Business Machines Corporation | System and method to monitor and determine if an active IPSec tunnel has become disabled |
AU2001281240A1 (en) * | 2000-08-10 | 2002-02-25 | University Of Pittsburgh | Apparatus and method for spare capacity allocation |
US7698463B2 (en) | 2000-09-12 | 2010-04-13 | Sri International | System and method for disseminating topology and link-state information to routing nodes in a mobile ad hoc network |
US7058016B1 (en) * | 2000-10-12 | 2006-06-06 | Cisco Technology, Inc. | Method and system for accelerating route calculation in link state routing protocols |
JP3729051B2 (en) * | 2000-10-18 | 2005-12-21 | 日本電気株式会社 | Inter-domain routing apparatus, system and method |
TW561747B (en) * | 2000-11-21 | 2003-11-11 | Ibm | Costs in data networks |
US20020136223A1 (en) * | 2000-12-19 | 2002-09-26 | Ho Ka K. | Method and apparatus for interworking PNNI with the signalling and routing protocols used in MPLS networks |
US6982951B2 (en) * | 2000-12-21 | 2006-01-03 | At&T Corp. | Method for selecting a restoration path in a mesh network |
US20020133756A1 (en) * | 2001-02-12 | 2002-09-19 | Maple Optical Systems, Inc. | System and method for providing multiple levels of fault protection in a data communication network |
US20020171886A1 (en) * | 2001-03-07 | 2002-11-21 | Quansheng Wu | Automatic control plane recovery for agile optical networks |
US7158486B2 (en) * | 2001-03-12 | 2007-01-02 | Opcoast Llc | Method and system for fast computation of routes under multiple network states with communication continuation |
US7035202B2 (en) * | 2001-03-16 | 2006-04-25 | Juniper Networks, Inc. | Network routing using link failure information |
US7065059B1 (en) * | 2001-08-09 | 2006-06-20 | Cisco Technology, Inc. | Technique for restoring adjacencies in OSPF in a non-stop forwarding intermediate node of a computer network |
US20030063613A1 (en) * | 2001-09-28 | 2003-04-03 | Carpini Walter Joseph | Label switched communication network and system and method for path restoration |
US7113481B2 (en) * | 2001-10-10 | 2006-09-26 | Alcatel | Informed dynamic path protection for optical networks |
CN2508474Y (en) * | 2001-12-03 | 2002-08-28 | 成都鼎天计算机数据设备有限公司 | Wide band edge router |
US7349427B1 (en) * | 2001-12-21 | 2008-03-25 | Nortel Networks Limited | Routing method and apparatus for optimising auto-tunnelling in a heterogeneous network |
FR2836314A1 (en) * | 2002-02-21 | 2003-08-22 | France Telecom | Method for protection of label switching paths in a multiprotocol label-switching network (MPLS), whereby an alternative dynamic bypass tunnel is provided with reserved network resources in case of failure of a first path element |
US7072304B2 (en) * | 2002-02-27 | 2006-07-04 | Nortel Networks Limited | Network path selection based on bandwidth |
US6744774B2 (en) * | 2002-06-27 | 2004-06-01 | Nokia, Inc. | Dynamic routing over secure networks |
US7209491B2 (en) * | 2002-06-28 | 2007-04-24 | Nokia Corporation | Method and system for transmitting data in a packet based communication network |
US7248579B1 (en) * | 2002-10-15 | 2007-07-24 | Cisco Technology, Inc. | System and method for providing a link state database (LSDB) snapshot for neighbor synchronization |
KR100472952B1 (en) * | 2002-10-30 | 2005-03-10 | 한국전자통신연구원 | A SIP(Session Initiation Protocol) Load Balancing Apparatus and Method |
US7260066B2 (en) * | 2002-10-31 | 2007-08-21 | Conexant Systems, Inc. | Apparatus for link failure detection on high availability Ethernet backplane |
US7280482B2 (en) * | 2002-11-01 | 2007-10-09 | Nokia Corporation | Dynamic load distribution using local state information |
CN1254052C (en) * | 2002-11-02 | 2006-04-26 | 华为技术有限公司 | Transmission network restraint path calculating method |
JP3799010B2 (en) | 2002-12-19 | 2006-07-19 | アンリツ株式会社 | Mesh network bridge |
US7707307B2 (en) * | 2003-01-09 | 2010-04-27 | Cisco Technology, Inc. | Method and apparatus for constructing a backup route in a data communications network |
CN1216472C (en) | 2003-03-31 | 2005-08-24 | 中国科学院计算机网络信息中心 | Control method for layered switching network node region |
US7508755B2 (en) * | 2003-07-07 | 2009-03-24 | Alcatel-Lucent Usa Inc. | Methods and devices for creating an alternate path for a bi-directional LSP |
US7701848B2 (en) * | 2003-07-11 | 2010-04-20 | Chunming Qiao | Efficient trap avoidance and shared protection method in survivable networks with shared risk link groups and a survivable network |
US7343423B2 (en) * | 2003-10-07 | 2008-03-11 | Cisco Technology, Inc. | Enhanced switchover for MPLS fast reroute |
JP2005260321A (en) * | 2004-03-09 | 2005-09-22 | Nec Corp | Alternative control system of label path network |
US7500013B2 (en) * | 2004-04-02 | 2009-03-03 | Alcatel-Lucent Usa Inc. | Calculation of link-detour paths in mesh networks |
WO2005117519A2 (en) * | 2004-05-25 | 2005-12-15 | Nortel Networks Limited | Connectivity fault notification |
JP4520802B2 (en) | 2004-09-09 | 2010-08-11 | 株式会社日立製作所 | Storage network management server, storage network management method, storage network management program, and storage network management system |
US20060092941A1 (en) * | 2004-11-01 | 2006-05-04 | Kazuhiro Kusama | Communication path monitoring system and communication network system |
US7970820B1 (en) * | 2008-03-31 | 2011-06-28 | Amazon Technologies, Inc. | Locality based content distribution |
-
2002
- 2002-12-17 US US10/323,358 patent/US7792991B2/en active Active
-
2003
- 2003-10-30 WO PCT/US2003/034672 patent/WO2004062208A1/en not_active Application Discontinuation
- 2003-10-30 CN CNB2003801065200A patent/CN100444575C/en not_active Expired - Fee Related
- 2003-10-30 AU AU2003303532A patent/AU2003303532B2/en not_active Ceased
- 2003-10-30 EP EP03814616.3A patent/EP1573987B1/en not_active Expired - Lifetime
- 2003-10-30 CA CA002509359A patent/CA2509359A1/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
US7792991B2 (en) | 2010-09-07 |
WO2004062208B1 (en) | 2005-01-06 |
US20040117251A1 (en) | 2004-06-17 |
CN100444575C (en) | 2008-12-17 |
EP1573987B1 (en) | 2016-10-19 |
CN1736064A (en) | 2006-02-15 |
EP1573987A1 (en) | 2005-09-14 |
AU2003303532A1 (en) | 2004-07-29 |
AU2003303532B2 (en) | 2006-11-30 |
WO2004062208A1 (en) | 2004-07-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2003303532B2 (en) | Method and apparatus for advertising a link cost in a data communications network | |
US7707307B2 (en) | Method and apparatus for constructing a backup route in a data communications network | |
EP1685681B1 (en) | Method and apparatus for determining network routing information based on shared risk link group information | |
US7580360B2 (en) | Method and apparatus for generating routing information in a data communications network | |
US7554921B2 (en) | Method and apparatus for generating routing information in a data communication network | |
US7330440B1 (en) | Method and apparatus for constructing a transition route in a data communications network | |
US7852751B2 (en) | Constructing repair paths around multiple non-available links in a data communications network | |
US20090067322A1 (en) | Forwarding data in a data communications network | |
US7496650B1 (en) | Identifying and suppressing transient routing updates | |
US7869348B2 (en) | Determining rerouting information for single-link failure recovery in an Internet protocol network | |
US7835312B2 (en) | Method and apparatus for updating label-switched paths | |
US7885179B1 (en) | Method and apparatus for constructing a repair path around a non-available component in a data communications network | |
US20060239211A1 (en) | Method and apparatus for constructing a forwarding information structure | |
US20060101158A1 (en) | Method and apparatus for managing a network component change | |
EP1673901B1 (en) | Method and apparatus for generating routing information in a data communications network | |
US7710882B1 (en) | Method and apparatus for computing routing information for a data communications network | |
EP2649758B1 (en) | Minimizing the number of not-via addresses |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
FZDE | Discontinued |